Implementation of Hierarchical Authorization For A Web-Based Digital Library

Access control mechanisms are needed in almost every system nowadays to control what kind of access each user has to which resources and when. On the one hand access control systems need to be flexible to allow the definition of the access rules that are actually needed. But they must also be easy t...

Full description

Bibliographic Details
Main Authors: Andreas Geyer-Schulz, Anke Thede
Format: Article
Language:English
Published: International Institute of Informatics and Cybernetics 2007-04-01
Series:Journal of Systemics, Cybernetics and Informatics
Subjects:
Online Access:http://www.iiisci.org/Journal/CV$/sci/pdfs/P405248.pdf
id doaj-cacef5c60e5d4d9d8fef47b6574cbf04
record_format Article
spelling doaj-cacef5c60e5d4d9d8fef47b6574cbf042020-11-24T22:34:35ZengInternational Institute of Informatics and CyberneticsJournal of Systemics, Cybernetics and Informatics1690-45242007-04-01525156Implementation of Hierarchical Authorization For A Web-Based Digital LibraryAndreas Geyer-Schulz0Anke Thede1 Informationsdienste und elektronische Märkte, Universität Karlsruhe (TH) Informationsdienste und elektronische Märkte, Universität Karlsruhe (TH) Access control mechanisms are needed in almost every system nowadays to control what kind of access each user has to which resources and when. On the one hand access control systems need to be flexible to allow the definition of the access rules that are actually needed. But they must also be easy to administrate to prevent rules from being in place without the administrator realizing it. This is particularly difficult for systems such as a digital library that requires fine-grained access rules specifying access control at a document level. We present the implementation and architecture of a system that allows definition of access rights down to the single document and user level. We use hierarchies on users and roles, hierachies on access rights and hierarchies on documents and document groups. These hierarchies allow a maximum of flexibility and still keep the system easy enough to administrate. Our access control system supports positive as well as negative permissions.http://www.iiisci.org/Journal/CV$/sci/pdfs/P405248.pdf role-based authorizationhierarchiesdigital library
collection DOAJ
language English
format Article
sources DOAJ
author Andreas Geyer-Schulz
Anke Thede
spellingShingle Andreas Geyer-Schulz
Anke Thede
Implementation of Hierarchical Authorization For A Web-Based Digital Library
Journal of Systemics, Cybernetics and Informatics
role-based authorization
hierarchies
digital library
author_facet Andreas Geyer-Schulz
Anke Thede
author_sort Andreas Geyer-Schulz
title Implementation of Hierarchical Authorization For A Web-Based Digital Library
title_short Implementation of Hierarchical Authorization For A Web-Based Digital Library
title_full Implementation of Hierarchical Authorization For A Web-Based Digital Library
title_fullStr Implementation of Hierarchical Authorization For A Web-Based Digital Library
title_full_unstemmed Implementation of Hierarchical Authorization For A Web-Based Digital Library
title_sort implementation of hierarchical authorization for a web-based digital library
publisher International Institute of Informatics and Cybernetics
series Journal of Systemics, Cybernetics and Informatics
issn 1690-4524
publishDate 2007-04-01
description Access control mechanisms are needed in almost every system nowadays to control what kind of access each user has to which resources and when. On the one hand access control systems need to be flexible to allow the definition of the access rules that are actually needed. But they must also be easy to administrate to prevent rules from being in place without the administrator realizing it. This is particularly difficult for systems such as a digital library that requires fine-grained access rules specifying access control at a document level. We present the implementation and architecture of a system that allows definition of access rights down to the single document and user level. We use hierarchies on users and roles, hierachies on access rights and hierarchies on documents and document groups. These hierarchies allow a maximum of flexibility and still keep the system easy enough to administrate. Our access control system supports positive as well as negative permissions.
topic role-based authorization
hierarchies
digital library
url http://www.iiisci.org/Journal/CV$/sci/pdfs/P405248.pdf
work_keys_str_mv AT andreasgeyerschulz implementationofhierarchicalauthorizationforawebbaseddigitallibrary
AT ankethede implementationofhierarchicalauthorizationforawebbaseddigitallibrary
_version_ 1725726664920399872